SSTI leads to Command injection

Disclosed: 2026-03-04 13:26:30 By errorbehavior200 To curl
None
Vulnerability Details
## Summary: Hi ,team i 'am new reasercher search for pleasure excuse me for poor technical details. the parmeter os is vulnerable to SSTI leads to command injection ## Affected version curl/7.55.1 ## Steps To Reproduce: i tried to injected the os parmeter ``` curl -os{popen('sleep 10').read()} --url gyvgzienwleealjmudejwl83p3p29bxi9.oast.fun ``` the reponse error: ``` curl: (3) [globbing] unmatched close brace/bracket in column 12 ``` for honesty i used gemni to inject command ``` curl -os{system("sleep 10")}.read --url gyvgzienwleealjmudejwl83p3p29bxi9.oast.fun ``` the reponse 200 ok and the request wait 10 ms for finished ## Impact ## Summary: unhanticated Rce via command line with sleep break the server until finish the request
Actions
View on HackerOne
Report Stats
  • Report ID: 3584149
  • State: Closed
  • Substate: not-applicable
Share this report